Information Classification & Protection Policy

Size: px
Start display at page:

Download "Information Classification & Protection Policy"

Transcription

1 University of Scranton Information Technology Policy Information Classification & Protection Policy Executive Sponsor: AVP Information Resources Responsible Office: Information Security Originally Issued: 4/1/2011 Revised: n/a I. Policy Statement All University departments will classify and protect all information that is entrusted to us. II. Reason for Policy This policy defines how University information is classified and how it is to be protected. Students, faculty, staff, and alumni trust that the University protects their personal information as it exists in any medium electronic, as well as all forms of paper record. This policy also helps to fulfill the requirements of federal and state information security regulations; specific examples of these regulations can be found on page 2. III. Entities Affected By This Policy This policy impacts all units of the University, and is specifically enacted by data stewards and department heads. IV. Website Address for this Policy V. Related Documents, Forms, and Tools Computer Security Incident Response Team Operational Standards Manual: Records Management and Retention Policy: University FERPA Policy: _Regulations Information Management Model contact AVP Information Resources 1

2 VI. Contacts For policy clarification and interpretation, or consulting on classification and control of electronic information, contact the Information Security Office at or For information on the classification and control of physical records, or consulting on the interpretation of federal and state regulations, contact the General Counsel s Office at VII. Definitions University information is contained in physical and electronic records. Physical records (which include all forms of paper records and documents) contain information directly readable by humans. Electronic records contain information that requires an electronic device to read the information. Information classification categories: Restricted information is University information that: Pertains to information protected by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Graham Leach Bliley (GLB) Act, Payment Card Industry Data Security Standard (PCI DSS), Federal Trade Commission Red Flag Rules, Pennsylvania Senate Bill 712, or any other federal, state, industry, or local law. See Appendix A/B for further information. Makes the University liable for costs or damages due to unauthorized disclosure under laws, government regulations, or contract. Includes authentication secrets (passwords, private keys, see Appendix A/B for further examples) information is University information that: Is used primarily to conduct official University business with limited internal distribution Contains proprietary information, pertains to student records that are covered by the Family Educational Rights and Privacy Act (FERPA), or pertains to donor records. See Appendix A/B for further information. Public information is University information that: Is not classified as restricted or confidential Known confidential and restricted data fields are contained in Appendix A/B. VIII. Responsibilities University department heads or designates are responsible to annually inventory all information their offices acquire, communicate, transmit, process, or store and assign it to one of the information classifications defined in this policy. Department heads shall then apply and document the appropriate controls for each set of records (e.g. forms, electronic documents, 2

3 database, etc.) based on the highest classification of data contained in those records (see currently supported controls in Appendix D and classification/documentation examples in Appendix C). Department heads should confer with their division s data steward throughout this process. The Information Security Office shall maintain a matrix of applicable controls by process and information type for use by department heads and Information Resources staff. This matrix shall be considered Appendix C of this policy. A list of technical procedures for implementing encryption and access controls will be maintained by Information Resources and published by the Information Security Office, considered Appendix D of this policy. IX. Procedures Controls The appropriate control shall be applied to every process used to handle restricted and/or confidential information, according to the classification of that information. Acquisition Restricted and information shall only be requested from an individual, or acquired from other sources, when there is a legal and active business use for the information. Access For Restricted and information, in any medium, University department heads shall use appropriate physical and electronic controls to limit access to this information to persons who need to use it to perform their University assigned duties and for whom it is legally appropriate to have access to this information. For restricted information, it is required that those given access have a need to know and have executed a non-disclosure/confidentiality agreement that covers this information. Network Transmission information may be transmitted over the University or external networks as required, provided that access to the information by normal means is restricted to those who must use it to perform University assigned duties. Restricted information shall not be transmitted over University or external networks, outside a data center, a firewalled network so designated by Information Resources, unless the data or the entire transmission is encrypted. Questions regarding encryption of data for external transmission should be directed to the Information Security Office prior to transmission. Data Processing The University and its employees shall employ data processing systems and procedures with appropriate safeguards to ensure that Restricted and information is not lost or disclosed to unauthorized persons during or after processing. 3

4 Communication and Restricted information communicated by voice, mail, fax, or other methods must use reasonable safeguards against disclosure to unauthorized persons, as appropriate to the method of communication. Restricted information may not be communicated to third parties, except as specifically required by legal obligation or protected under contractual agreements. Storage information shall be stored in physical or electronic environments where access is limited to only those who need to use the information for University assigned duties and for whom it is legally appropriate to have access to the information Restricted information in electronic records shall be secured with strong encryption when stored outside the central University administrative database. Restricted information in all forms of physical records must either be security locked or actively supervised in a private environment at all times. Retention, Disposal and Transfer and Restricted information must be retained and disposed of in accordance with the University s Records Management Policy. Computers and other electronic devices must be transferred or disposed of in accordance with the Desktop Computer Disposal Procedure. Improper Disclosure or Loss All faculty, staff, and students shall immediately report inappropriate disclosure or suspected loss of or Restricted information to the Computer Security Incident Response Team (CSIRT) via abuse@scranton.edu or The responsible division head or dean will sign any legally mandated information breach notification letters for information lost or disclosed by their employees. For more information see the CSIRT Operational Standards Manual. X. Appendix (optional) Appendix A Information Protection Data Fields by Classification Appendix B Information Protection Data Fields Alphabetical Appendix C Information Protection Controls for Each Classification Appendix D Information Protection Approved Technological Procedures Appendix E Information Protection Examples of Information Classification and Controls 4

5 Appendix A Information Protection by Classification Specific and Restricted Data Fields with Examples of Public Data SPECIFIC CONFIDENTIAL DATA FIELDS This is not an exhaustive list; however, these are known confidential data fields: FERPA Protected Student Records: As defined by the U.S. Department of Education, the Family Educational Rights and Privacy Act is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. Further explanation can be found at the U.S. Department of Education website ( Grades / Transcripts Class lists or enrollment information Student Financial Services information Athletics or department recruiting information Payment History Financial Aid / Grant information / Loans Student Tuition Bills Note that the following data may ordinarily be revealed by the University without student consent unless the student designates otherwise. Name Former name(s) Address (local and permanent) Telephone number (campus/local and permanent) Date and place of birth Photograph Major field of study Participation in officially recognized activities and sports address Dates of attendance Enrollment status Campus employment Class level Expected/actual date of graduation Degrees, awards, academic honors Weight and height of members of athletic teams Employee Information Performance reviews Worker's compensation or disability claims Name in association with: o Salary or payroll information o Date of birth o Home address or personal contact information o Benefits information 5

6 Management data Detailed annual budget information University investment information Non-anonymous faculty course evaluations General Information information shared with legal counsel Internal departmental memos and other correspondence for internal-use-only SPECIFIC RESTRICTED DATA FIELDS This is not an exhaustive list of data fields that are covered by non-ferpa laws and University Policy; however, these are known restricted data fields: Sensitive Personal Information Controlled by Law, Contract or Policy Credit Card Numbers Debit Card Numbers Bank Account Numbers PIN Numbers Social Security Numbers Drivers License or State Identification Numbers Authentication Secrets: passwords, lists of passwords or private keys for certificate authentication HIPAA Protected Health Information: As defined by the U.S. Department of Health and Human Services, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) protects individuals from the wrongful disclosure of individually identifiable health information. In summary, HIPAA prohibits institutions from releasing patient information that can be traced back to a specific individual. Further information can be found at the official HIPAA website The following data, in relation to one s status as a patient, is considered restricted information. Patient Names Street address, city, county, zip code Dates (except year) for dates related to an individual Telephone/Facsimile numbers , URLs, & IP addresses Account/Medical record numbers Health plan beneficiary numbers Certificate/license numbers Vehicle identification's & serial numbers Device identification's & serial numbers Biometric identifiers Full face images Any other unique identifying number, characteristic, or code Payment Guarantor's information 6

7 EXAMPLES OF PUBLIC DATA FIELDS These are examples only: Campus maps Business contact data (e.g., directory information) Event and class schedules 7

8 Appendix B Information Protection Alphabetical Specific and Restricted Data Fields with Examples of Public Data Department heads shall apply and document the appropriate controls for a set of records (e.g. forms, electronic documents, database, etc.) based on the highest classification of data contained in those records. Data Field Classification Special Note Athletics Information Alumni Information Authentication Secret such as: Restricted Passwords List of Passwords Private Keys for Certificates Bank Account Number and/or Restricted PIN Number Budget Information Campus Map Public Course Enrollment Information Course Schedule Public Credit Card Number Restricted Debit Card Number Restricted Departmental Memo Directory Information Public Drivers License Number Restricted Employee Disability Claim Employee Name with: Benefits Information Date of Birth Home Address Personal Contact Information Salary or Payroll Information Employee Performance Review Employee Social Security Restricted Number Employee Worker s Compensation Claim Student Health Services Information ** See Notes See Patient Information below. Legal Counsel Communication Library Circulation Records Restricted Medical Records ** See Notes See Patient Information below. Password(s) Restricted 8

9 Patient Information including Account Information Beneficiary Information Biometric Identifiers Address Guarantor s Information Health Plan Information Identification Number(s) Medical Record(s) Name(s) Personal Contact Information Photographs Other Unique Identifying Information Royal Id Social Security Number Student Disciplinary Records Student Financial Aid Information Student Grades Student Grant Information Student Loan Information Student Name with Address (local and permanent) Telephone number (campus/local and permanent) Date and place of birth Photograph Major field of study Participation in officially recognized activities and sports address Dates of attendance Enrollment status Campus employment Class level Expected/actual date of graduation Degrees, awards, academic honors Weight and height of members of athletic teams Student Non-public Financial Information (such as income, assets, tax forms) Student Payment History Student Social Security Number Student Tuition Bill Restricted Restricted HIPAA prohibits institutions from releasing patient information that can be traced back to a specific individual. ** See Notes These data fields may ordinarily be revealed by the University without student consent unless the student designates otherwise. Restricted 9

10 Information Student Transcripts University Counseling Center Records University Investment Information **See Notes See Patient Information 10

11 Appendix C Information Protection Appropriate Controls for Each Information Classification by Handling Process Classification Restricted Public Process: Acquisition Access Network Transmission Data Processing Communication Storage Retention, Disposal, Transfer Must be: Legal to acquire Actively used Limited to those with University duties that require access Data or entire transmission must be encrypted outside datacenter Systems must use appropriate safeguards to prevent loss/disclosure Methods must prevent disclosure to unauthorized persons Must be one of: Strong encryption using strong password or private key University central administrative database Securely locked Actively supervised in Must be: Legal to acquire Actively used Limited to those with University duties that require access and for whom it is legally appropriate to have access As required on internal and external networks Systems must use appropriate safeguards to prevent loss/disclosure Requires appropriate safeguards against disclosure Storage in a secure location with controls in place to limit access to those with University duties that require access Must be: Legal to acquire Not restricted As required on internal and external networks As required on any system As required to all persons As required a private environment According to Records Management Policy and Desktop Computer Disposal Procedure 11

12 Appendix D Information Protection Technological Procedures for Access, Transmission, and Storage Controls ACCESS Access to confidential and restricted information in electronic records shall be controlled as follows: Use appropriate system or network permissions for the individual or group to restrict access Authenticate each person accessing the information individually using one of the following: o University Network ID and Password o Other unique ID and a strong password that meets Information Resources Password Complexity Requirements All authentication must be encrypted. TRANSMISSION Public and Information may be transmitted as required on internal and external networks. Restricted information may NOT be transmitted on any network without encryption. Acceptable encrypted network transmission methods include: Virtual Private Network (VPN) where systems on both ends of the transmission meet Security requirements. Examples: o Using a VPN connection to restricted information is NOT encrypted transmission because the will leave the VPN at some point on the way to its destination o Using a VPN to access reports from the central administrative system is secure transmission because the unencrypted reporting system is inside a data center Secure Sockets Layer (SSL) or Transport Layer Security (TLS) transport for network protocols such as Secure HyperText Transfer Protocol (HTTPS), Lightweight Directory Access Protocol (LDAP), etc. Secure Shell (SSH) and related protocols Secure File Transfer Protocol (SFTP) and Secure Copy (SCP) Remote Desktop Protocol (RDP) using encryption Secure attachments server (Royal Drive) STORAGE Storage of restricted information outside the central administrative database requires strong encryption with a strong password. Examples of storage encryption known to be strong include: Microsoft Encrypting File System (EFS) on Windows XP or later FileVault and disk image encryption on Macintosh OS/X Pretty Good Privacy (PGP) public/private key encryption, where the private key is secured Sophos Utimaco SafeGuard (whole disk encryption) Programs using standard protocols with at least a 128bit key protected by a strong password, examples include: o Triple DES/3DES o AES o IDEA 12

13 o Blowfish For consulting on access control, and encrypted transmission and storage methods, please contact the Information Security Office. 13

14 Appendix E Information Protection Examples of Information Classification and Access Controls NOTE: Each set of records should have controls applied according to the highest classification of data contained in those records; the procedures for implementing those controls by the department must be documented. The following examples are intended to assist with information classification. Applying the appropriate controls is the responsibility of the department head and data steward. Example 1: A physical form contains a restricted field, e.g. Social Security Number. Therefore, the entire form is handled under the restricted controls. Despite the presence of public and confidential information on the form, the entire form is classified as restricted and handled accordingly. If all of the data from the example form is entered into a single spreadsheet, that spreadsheet becomes restricted information and must have controls for restricted data applied and documented. If the SSN data from the example form is entered into one spreadsheet while the rest of the data is entered into a database (without the SSN), then the spreadsheet needs the restricted controls applied and documented, but the database does not. The department will document how the forms are obtained, handled and secured under the appropriate controls (e.g. which locked storage will be used when not being processed in a private area; what to do with the forms when they must be temporarily left unattended). The department will document how the spreadsheet containing the SSNs will be encrypted when transmitted (e.g. Secure Attachments server and stored on disk using PGP). Example 2: Someone calls into the Campus Operator asking for a student s residence hall assignment. Unless the student has previously requested that his/her contact information not be disclosed, the student s residence hall information can be disclosed without violated FERPA regulations. Information Classification and Protection Policy 14

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

Data Governance & Classification Policy A Data Classification and Data Types

Data Governance & Classification Policy A Data Classification and Data Types Data Governance & Classification Policy 9.1.1.A Data Classification and Data Types Data Classification and Data Types The university utilizes various data types. Data types with similar levels of risk

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Access to University Data Policy

Access to University Data Policy UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public

More information

Protecting Your Gear, Your Work & Cal Poly

Protecting Your Gear, Your Work & Cal Poly 9/20/2016 1 Protecting Your Gear, Your Work & Cal Poly Information Security Office Shar i f Shar i f i, CI SSP, CRISC Kyle Gustafson, Information Security Analyst Jon Vasquez, Information Security Analyst

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

IAM Security & Privacy Policies Scott Bradner

IAM Security & Privacy Policies Scott Bradner IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

DATA STEWARDSHIP STANDARDS

DATA STEWARDSHIP STANDARDS DATA STEWARDSHIP STANDARDS Policy: Enterprise Data Stewardship Policy Document: Data Stewardship Standards Campus: MSU-Billings (MSUB) Revision: 01-08-18 Contact: Michael Barber, Chief Information Officer

More information

Southern Adventist University Information Security Policy. Version 1 Revised Apr

Southern Adventist University Information Security Policy. Version 1 Revised Apr Southern Adventist University Information Security Policy Version 1 Revised Apr 27 2015 Summary The purpose of this policy statement is to establish the requirements necessary to prevent or minimize accidental

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between (UMMC) ( Data Custodian ), and ( Recipient ), located at

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices

Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices Presented by Michael Harris [MS, CISSP, WAPT] Systems Security Analyst University of Missouri Overview What data

More information

DEPAUW UNIVERSITY DATA CLASSIFICATION POLICY AND HANDLING RECOMMENDATIONS ( )

DEPAUW UNIVERSITY DATA CLASSIFICATION POLICY AND HANDLING RECOMMENDATIONS ( ) DEPAUW UNIVERSITY DATA CLASSIFICATION POLICY AND HANDLING RECOMMENDATIONS (05-01-2016) I. Purpose...1 II. Scope...1 III. Acknowledgements...1 IV. Institutional Data Classification Levels...2 V. Classification

More information

Information Privacy Statement

Information Privacy Statement Information Privacy Statement Commitment to Privacy The University of Florida values individuals' privacy and actively seeks to preserve the privacy rights of those who share information with us. Your

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Removable Storage Media Security Standard This standard is applicable to all VCU School of Medicine personnel.

More information

What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1

What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1 What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1 Risk Assessments - Datasets Dataset Definition A dataset (or data set) is a collection

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

CCC Data Management Procedures DCL3 Data Access

CCC Data Management Procedures DCL3 Data Access Information Technology Procedures CCC Data Management Procedures DCL3 Data Access Scope: CCC Revision Date: 9/1/2016 Effective Date: 3/1/2015 Approver: Information Security Program Office Table of Contents

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL Just a Few Reminders HIPAA applies to Covered Entities HIPAA is a federal law that governs the privacy

More information

UCOP ITS Systemwide CISO Office Systemwide IT Policy

UCOP ITS Systemwide CISO Office Systemwide IT Policy UCOP ITS Systemwide CISO Office Systemwide IT Policy Revision History Date: By: Contact Information: Description: 08/16/17 Robert Smith robert.smith@ucop.edu Initial version, CISO approved Classification

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union) ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE INTRODUCED NOVEMBER 0, 0 Sponsored by: Assemblywoman ANNETTE QUIJANO District 0 (Union) SYNOPSIS Requires certain persons and business entities to maintain

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services Augusta University Medical Center Policy Library Mobile Device Policy Policy Owner: Information Technology Support and Services POLICY STATEMENT Augusta University Medical Center (AUMC) discourages the

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

Information Use Policy NATIONAL RURAL ELECTRIC COOPERATIVE ASSOCIATION

Information Use Policy NATIONAL RURAL ELECTRIC COOPERATIVE ASSOCIATION Information Use Policy NATIONAL RURAL ELECTRIC COOPERATIVE ASSOCIATION Policy The National Rural Electric Cooperative Association, its Affiliates 1, and its Voting and Non- Voting Members (collectively,

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Security Standards for Information Systems

Security Standards for Information Systems Security Standards for Information Systems Area: Information Technology Services Number: IT-3610-00 Subject: Information Systems Management Issued: 8/1/2012 Applies To: University Revised: 4/1/2015 Sources:

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Mobile Device policy Frequently Asked Questions April 2016

Mobile Device policy Frequently Asked Questions April 2016 Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration

More information

IIT Cognos Portal Librarian Guide

IIT Cognos Portal Librarian Guide IIT Cognos Portal Librarian Guide 1.0 About the Cognos Portal The IIT Cognos Portal allows users to access reports and perform analysis based on data stored in the SunGard Banner Operation Data Store (ODS)

More information

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate

More information

Frequently Asked Question Regarding 201 CMR 17.00

Frequently Asked Question Regarding 201 CMR 17.00 Frequently Asked Question Regarding 201 CMR 17.00 What are the differences between this version of 201 CMR 17.00 and the version issued in February of 2009? There are some important differences in the

More information

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014 Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents

More information

LCU Privacy Breach Response Plan

LCU Privacy Breach Response Plan LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Information Technology Security Plan (ITSP)

Information Technology Security Plan (ITSP) Information Technology Security Plan (ITSP) Table of Contents 1. Purpose... 3 2. Goal... 3 3. NIST Risk Management Framework... 3 4. Scope... 4 5. System Description... 4 6. Authorization Boundary... 5

More information

U.S. Private-sector Privacy Certification

U.S. Private-sector Privacy Certification 1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

EDI ENROLLMENT AGREEMENT INSTRUCTIONS

EDI ENROLLMENT AGREEMENT INSTRUCTIONS EDI ENROLLMENT AGREEMENT INSTRUCTIONS The Railroad EDI Enrollment Form (commonly referred to as the EDI Agreement) should be submitted when enrolling for electronic billing. It should be reviewed and signed

More information

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes Effective Date: 01/01/2014 Page 1 of 7 REVISION HISTORY Revision No. Revision Date Authors Description of Changes 1.0 11/04/2013 CISO Populate Into Standard Template APPROVED BY This Policy is established

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account

Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*. FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide

More information

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

UCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description:

UCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description: UCOP ITS Systemwide CISO Office Systemwide IT Policy UC Event Logging Standard Revision History Date: By: Contact Information: Description: 05/02/18 Robert Smith robert.smith@ucop.edu Approved by the CISOs

More information

Media Protection Program

Media Protection Program Media Protection Program Version 1.0 November 2017 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PROGRAM DETAILS 4 3.2 MEDIA STORAGE AND ACCESS 4 3.3 MEDIA TRANSPORT

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018 Effective Date: July 2, 2018 PRIVACY COMMITMENT Protecting your privacy is very important to Prosci and this privacy policy is our way of providing you with details about the types of information we collect

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation.

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation. Compliance A primer Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation. The growth in the sharing of sensitive data combined with

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

You may use the Service to either access, establish or change the following:

You may use the Service to either access, establish or change the following: Online Access Agreement June 18, 2015 (Revision date) I. Introduction This Online Access Agreement (this "Agreement") contains the terms that govern your use of the Participants' Private Area of the www.afmsagaftrafund.org

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Emergency Nurses Association Privacy Policy

Emergency Nurses Association Privacy Policy Emergency Nurses Association Privacy Policy The Emergency Nurses Association ( ENA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service while respecting your

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Canadian Anti-Spam Legislation (CASL)

Canadian Anti-Spam Legislation (CASL) Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS The purpose of this document is to assist and guide U of R employees regarding their obligations under the Canadian Anti-Spam Legislation

More information

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 16, 2016. Replaces the prior version in its entirety. Capitalized terms used in these Document Cloud Additional Terms ( Additional

More information

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Elements of a Swift (and Effective) Response to a HIPAA Security Breach Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information

More information

Barrie Baydogs Triathlon Club Inc (Baydogs) Privacy Policy

Barrie Baydogs Triathlon Club Inc (Baydogs) Privacy Policy Barrie Baydogs Triathlon Club Inc (Baydogs) Privacy Policy Purpose 1. Privacy of personal information is governed by the Personal Information Protection and Electronics Documents Act ( PIPEDA ). Baydogs

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018 SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina

More information

NYSIF.com Online Account Third-Party Billers.V3

NYSIF.com Online Account Third-Party Billers.V3 NYSIF.com Online Account Third-Party Billers.V3 April 26, 2018 Contents About this Guide... 1 Create an Account... 2 Logging into your Account... 2 Account Management... 3 Change Password... 3 Enhanced

More information